www.websecurityworks.com Open in urlscan Pro
216.81.147.137  Public Scan

URL: https://www.websecurityworks.com/Endpoint-Protection.asp
Submission: On August 24 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET /search.php

<form class="top-search" role="search" action="/search.php" method="get">
  <div class="input-group">
    <input type="text" class="form-control" placeholder="Search by Model, Part, or SKU" name="q">
    <div class="input-group-btn">
      <button class="btn btn-primary" type="submit"><i class="fa fa-search"></i></button>
    </div>
  </div>
</form>

GET /search.php

<form class="top-search" role="search" action="/search.php" method="get">
  <div class="input-group">
    <input type="text" class="form-control" placeholder="Search by Model, Part, or SKU" name="q">
    <div class="input-group-btn">
      <button class="btn btn-primary" type="submit"><i class="fa fa-search"></i></button>
    </div>
  </div>
  <br>
  <br>
  <a href="/policies/legal.asp"><img src="/images/mastercard-visa-amex-discover.png" alt="Virtual Graffiti accept Mastercard, VISA, America Express and Discover Card"></a>
</form>

Text Content

This site uses cookies to improve your user experience. By continuing to use
this site you agree to the use of cookies. View our Privacy Policy to learn
more.

Accept


CALL A SPECIALIST TODAY! 866-981-2998

Call a Specialist Today! 866-981-2998
Free Shipping!


Toggle navigation
 * Products
   * Application Security
     * Application Control
     * Security for Email Servers
     * Security for Microsoft SharePoint
   * Data Protection & Encryption
     * Complete Data Protection Advanced
     * Complete Data Protection
     * Complete Data Protection Essential
     * Data Loss Prevention
     * Additional Products
       * Device Control
       * DLP Endpoint
       * DLP Discover
       * DLP Manager
       * DLP Monitor
       * DLP Prevent
   * Database Security
     * Data Center Security Suite for Databases
     * Vulnerability Manager for Databases
     * Additional Products
       * Security Scanner for Databases
   * Endpoint Protection
     * Complete Endpoint Protection Enterprise
     * Complete Endpoint Protection Business
     * Endpoint Protection Essential for SMB
     * Active Response
     * Additional Products
       * Endpoint Protection Advanced Suite
       * Endpoint Protection Suite
       * Endpoint Threat
       * Endpoint Protection for Mac
       * Embedded Control
       * ePO Deep Command
       * Host Intrusion Prevention for Desktop
       * Security for Microsoft SharePoint
       * SiteAdvisor Enterprise
       * VirusScan Enterprise
       * VirusScan for Linux
       * VirusScan for Mac
   * Network Security
     * Network Security Platform
       * M-1250
       * M-1450
       * M-2850
       * M-2950
       * M-3050
       * M-4050
       * M-6050
       * M-8000
       * M-8000XC
       * XC-240 Load Balancer
       * Network Security Accessories
     * Advanced Threat Defense
     * Intel Security Controller
   * Risk Management
     * Application Control
     * Change Control
     * Integrity Control
     * Policy Auditor
   * Security Management
     * ePolicy Orchestrator
     * Threat Intelligence Exchange
   * Server Security
     * Server Security Suite Essentials
     * Server Security Suite Advanced
     * Public Cloud Server Security Suite
     * Security Suite for Virtual Desktop Infrastructure
     * Additional Products
       * MOVE AntiVirus
       * Application Control
       * Change Control
       * Host Intrusion Prevention for Server
       * VirusScan for Storage
   * SIEM
     * Enterprise Security Manager
     * SIEM Add-Ons
       * Advanced Correlation Engine
       * Application Data Monitor
       * Database Event Monitor for SIEM
       * Event Receiver
       * Event Reporter
       * Enterprise Log Manager
       * Global Threat Intelligence for ESM
   * Web Security
     * Web Protection
     * Web Gateway
     * SaaS Web Protection
   * View All Products
 * Resources
   * McAfee End of Life Products
   * 3rd Party Solution
   * Consulting
   * Leasing
 * Get a Quote!
 * Contact Us

 * Account
   * Shopping Cart
   * Your Account
   * Order History
   * Help with checkout

 * Home
 * Products
 * Endpoint Protection Suite


MCAFEE ENDPOINT PROTECTION SUITE
SECURE MICROSOFT WINDOWS, MAC, AND LINUX SYSTEMS WITH ESSENTIAL ENDPOINT AND
DATA PROTECTION





SORRY, THIS PRODUCT IS NO LONGER AVAILABLE, REPLACED BY THE ENDPOINT THREAT
PROTECTION.

Click here to jump to more pricing!

 * 
 * Overview
 * Features
 * Benefits
 * System Requirements
 * Documentation


OVERVIEW:

Traditional Windows, Mac, and Linux systems within your LAN need essential
security to block advanced malware, control data loss and compliance risks
caused by removable media, and provide safe access to critical email and web
applications. McAfee Endpoint Protection Suite integrates these core functions
into a single, manageable, multiplatform environment ideal for safeguarding
traditional desktops that have limited exposure to Internet threats.

Endpoint Protection Suite includes:

Real-time anti-malware and antivirus protection — Block viruses, Trojans, worms,
adware, spyware, and other potentially unwanted programs that steal confidential
data and sabotage user productivity.

Proactive email and web security — Intercept malware and spam before it reaches
inboxes. Built-in McAfee SiteAdvisor Enterprise Plus warns users about malicious
websites before they click and allows administrators to authorize or block
website access, ensuring compliance.

Desktop firewall — Control desktop applications that can access the network, and
stop network-borne attacks and downtime. Deploy and manage firewall policies
based on location to deliver complete protection and compliance with
regulations.

Comprehensive device control — Monitor and restrict data copied to removable
storage devices and media to keep it from leaving company control.

Unrivaled centralized management — The McAfee ePolicy Orchestrator (McAfee ePO)
platform with Real Time for McAfee ePO provides instant visibility and control
over security defenses and unifies controls over all your security and
compliance tools, from McAfee as well as third parties.

Traditional desktops and fixed systems within your LAN probably have layers of
gateway or network security to protect them. Yet they still need essential
security to block advanced malware, control data loss and compliance risks
caused by removable media, and provide safe access to critical email and web
applications. The McAfee® Endpoint Protection Suite integrates these core
functions into a single, manageable environment ideal for safeguarding
traditional desktops and other systems that have limited exposure to Internet
threats.

What do call centers, engineering design studios, and doctors’ offices have in
common? Their users rely on tower-based PCs and traditional desktop systems that
never leave the office. Since these systems don’t visit wireless hot spots, help
kids browse the Internet at night, or get left at airports, they have a lower
risk of being hacked, picking up malicious downloads, or being stolen while
carrying sensitive data.

However, corporate users rely heavily on webenabled applications and email, so
even these fixed machines require sophisticated protection against the targeted,
real-time malware these applications convey. Your email server should have an
extra dose of anti-malware, backed up by malware protection on each endpoint
itself.

In addition, most modern PCs have multiple USB ports and DVD drives. In the case
of call centers, engineering design studios, and doctors’ offices, an unhappy
worker might take home customer databases, engineering designs and other
intellectual property, or patient records and financial data. Device controls
can help you restrict use of removable media and portable storage to avoid these
data losses.

The McAfee Endpoint Protection Suite seamlessly integrates proven security to
help you manage all of these risks, delivering both operational efficiencies and
cost savings with the convenience of a single solution.


KEY POINTS

 * Essential protection that consolidates endpoint and data security
 * Reduces the time and effort spent deploying and managing security
 * One-stop shopping for the right protections for traditional and fixed
   desktops


MCAFEE SETS THE INDUSTRY STANDARD

 * Recognized by Gartner as a leader in Endpoint Security and Mobile Data
   Protection
 * First to manage a broad range of security products, including endpoint,
   network, data, web, and email security with one console
 * First to deliver a single agent and single console for managing
   endpoint security
 * First product to have a unified management platform for endpoint security and
   compliance management
 * First to manage both McAfee and third-party security products
 * First to combine endpoint security and data protection in one truly
   integrated suite


FEATURES:

Protect your endpoints from every angle
Guard all Windows, Mac, and Linux endpoints against system, data, email, web,
and network threats.

Speed risk management
Use Real Time for McAfee ePO to understand the health, configuration, and state
of security defenses in moments, then target updates, changes, and installations
to the systems that need them. You can also monitor to confirm installations as
they progress.

Save time and money
Consolidate endpoint and data security efforts with an integrated endpoint
security solution from one vendor — securing stronger protection at a lower
cost. McAfee enables you to manage endpoint security from one centralized
console and connect to other McAfee and third-party products, improving
visibility and expediting response times.

Deploy quickly and easily
Enable increased protection without delay. The EASI installer gets your strong
protection running in as few as four clicks. Endpoint Protection Suite is
integrated with the McAfee ePolicy Orchestrator (ePO) platform so you can deploy
and manage security using a single environment.

Feature Why You Need It Single integrated management McAfee ePO software
provides instant visibility into security status and events and direct access to
management for unified control of all your security and compliance tools Real
Time for McAfee ePO Instant visibility into the security state and health of
McAfee products. Real-time actions help ensure that defenses are installed,
running, correctly configured, and up to date Multiplatform Protects the full
range of endpoints required by mobile and knowledge workers, including Mac,
Linux, and Microsoft Windows Device control Lets you monitor and restrict data
copied to removable storage devices and media to keep it from leaving company
control Desktop firewall Ensures that network-based attacks are prevented and
only legitimate network traffic is allowed Anti-malware Blocks viruses, Trojans,
worms, adware, spyware, and other potentially unwanted programs that steal
confidential data and sabotage user productivity Antispam Helps eliminate spam,
which can lead unsuspecting users to sites that distribute malware and phish
Email server security Protects your email server and intercepts malware before
it reaches the user inbox Safe surf and search Helps ensure compliance and
reduce risk from web surfing by warning users about malicious websites before
they visit and letting administrators authorize and block website access


BENEFITS:


ALWAYS ON, REAL-TIME MALWARE PROTECTION

With the unprecedented growth of advanced persistent threats, enterprises cannot
depend on solutions that use only signature analysis for endpoint protection.
There is a gap of 24 to 72 hours from the time a threat is identified to the
moment its signature is applied to endpoints. In the meantime, your data and
systems are exposed.

McAfee Global Threat Intelligence™ file reputation closes this gap, providing
real-time, always-on protection based on the multi-vector threat insight
gathered by McAfee Labs. It quarantines or blocks viruses, Trojans, worms,
adware, spyware, and other potentially unwanted programs that steal confidential
data and sabotage user productivity.


ADVANCED EMAIL VIRUS AND SPAM PROTECTION

Our solution scans your inbound and outbound emails to intercept spam,
inappropriate content, and harmful viruses. We can quarantine suspicious emails
to prevent evolving email threats from affecting your network and users. And a
layer of antivirus protection for your email server prevents malware from
reaching user inboxes.


COMPREHENSIVE DEVICE CONTROL

We make it possible to prevent critical data from leaving your company through
removable media, such as USB drives, iPods, Bluetooth devices, recordable CDs,
and DVDs. Tools help you monitor and control data transfers from all desktops,
even if a device is physically disconnected from the corporate network.


STATEFUL DESKTOP FIREWALL

Control desktop applications that can access the network to stop network-borne
attacks and downtime. You can deploy and manage firewall policies based on
location to deliver complete protection and compliance with regulatory rules.


PROACTIVE WEB SECURITY

Many web threats are silent and invisible to web surfers. Help ensure compliance
and reduce risk from web surfing by warning users about malicious websites
before they visit. You can also authorize and block website access based on
users and groups, controlling user access to sensitive or inappropriate sites,
such as gaming or adult content.


MANAGEMENT THAT LOWERS OPERATIONAL COSTS

All of the capabilities of the McAfee® Endpoint Protection Suite are managed by
McAfee ePolicy Orchestrator® (McAfee ePO™) software, a centralized platform that
manages security, enforces protection, and lowers the cost of security
operations. Web-based for easy access, it provides intelligent security for
quick and effective decisions and greater control.

McAfee ePO software can reduce the cost of managing IT security and compliance
by more than 60 percent (Source: MSI International survey of 488 mid-sized and
large enterprises).

This open management framework takes advantage of a single agent and single
console design. Compared to old-style point solutions, our streamlined approach
dramatically simplifies installation and maintenance of defenses and their
associated rules and policies. It eliminates the system impact of multiple
agents and the decision inefficiencies of multiple consoles. When policies need
to be revised, updates happen quickly, accurately, and consistently.

You can correlate threats, attacks, and events from endpoint, network, and data
security as well as compliance audits to improve the relevance and efficiency of
security efforts and compliance reports. No other vendor can claim a single
integrated management platform across all these security domains.


WHEN MINUTES COUNT, REAL TIME FOR MCAFEE EPO SOFTWARE DELIVERS

Real Time for McAfee ePO software uses a scalable peer-to-peer methodology for
querying information from all your endpoints in mere moments, with no extra
hardware. This allows administrators to assess the security state and health of
McAfee defenses whenever they need to. Then, through its unified dashboard and
predefined actions, the workflow from diagnosis to mitigated risk takes minutes,
not days. This groundbreaking technology dramatically reduces the exposure,
risk, and cost of security events, outages, potential breaches, and damaged
reputations. Enhance situational awareness and incident response for front-line
endpoint administrators using an approach that scales to the largest
organizations.


SYSTEM REQUIREMENTS:

These are minimum system requirements only. Recommended requirements are in
parenthesis, where applicable. Actual requirements will vary depending on the
nature of your environment. 64-bit operating system support is available for
some technologies.

 * Workstations
   * Windows 8
   * Windows 7 or Embedded
   * Windows Vista
   * Windows XP Home, Professional, Embedded (WEPOS), Tablet PC
   * Windows 2000 Professional with Service Pack 2 (SP2) or higher
   * Mac OS X Mountain Lion (version 10.8 or higher)
   * Mac OS X Lion (version 10.7 or higher)
   * Mac OS X Snow Leopard (version 10.6 or higher)
   * Mac OS X Leopard (version 10.5 or higher)
 * Servers
   * Windows 2008 Server, HyperV, Core, Datacenter, Storage Server, Cluster
     Server, Small Business Server
   * Windows 2003 Server, Storage Server, Cluster Server, Datacenter, Small
     Business Server
   * Windows 2000 Server, Advanced Server, Small Business Server
   * VMware ESX, ESXi
   * Citrix XenDesktop and XenServer
 * Other supported platforms
   * FreeBSD 6.1 and 7.0 (32-bit) (Command Line Scanner)
   * HP-UX 11.0, 11i, 11i v2/v3 (Command Line Scanner)
   * IBM AIX 5.2, 5.3, 6.1 (Command Line Scanner)
   * Linux Kernel 2.4 (32-bit) and 2.6 (64-bit) (Command Line Scanner)
   * Solaris 8, 9, 10 (32-bit/64-bit) (Command Line Scanner)
   * Citrix MetaFrame 1.8 and XP Support
   * EMC Celerra File Server
 * Email server requirements
   * Microsoft Exchange 2003 SP1, 2007 (64-bit), 2010 (v7.0.2)
   * Microsoft Exchange 2000 SMB, 2003 Server, or Advanced Server
   * Lotus Domino 6.0.3-6.0.5, 7.0, 8.0 (32-bit), 8.5 (32-bit)
 * Database software requirements
   * Microsoft SQL Server 2008 (32-bit/64-bit), Express
   * Microsoft SQL Server 2005 (32-bit/64-bit), Express
 * Supported web server platforms
   * IIS 4.0, 5.0, and 6.0 (Microsoft Windows)


DOCUMENTATION:

Download the McAfee Endpoint Protection Suite Datasheet (PDF).

Pricing Notes:

 * Pricing and product availability subject to change without notice.


SITE MAP:

 * Home
 * Shopping Cart
 * Contact Us
 * 


PRODUCTS:

 * Endpoint Protection
 * Endpoint Protection Adv.
 * Endpoint Protection Mac
 * Endpoint Protection Bus.
 * Endpoint Protection Ent.
 * VirusScan for MAC
 * View all Products


RESOURCES:

 * News
 * Shipping
 * Returns
 * Consulting

Call a Specialist Today!
866-981-2998






CONTACT:

1225 Crescent Green, St. 115
Cary, NC 27518
866-981-2998
Sales@WebSecurityWorks.com
Get a Quote!




WebSecurityWorks.com is a division of BlueAlly, an authorized Intel Security
reseller.
Copyright © 2000-2023. All Rights Reserved. Site Terms and Privacy Policy

word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word

mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
Welcome!

I'm here to help